Integrated security for Malaysia Airlines

August 2013 Access Control & Identity Management, Surveillance

CEM Systems, part of Tyco Security Products, has announced that the AC2000 security management system has been selected to secure the offices of the 5-star Malaysia Airlines.

Established more than 60 years ago, Malaysia Airlines flies to destinations across six continents. The airline has a long history of providing excellent service and has won over 100 awards in the last 10 years, including Asia’s Leading Airline. Malaysia Airlines required a security solution that was powerful yet reliable and could be integrated with a variety of systems to form a complete security management system (SMS).

“CEM has a long history of working with aviation customers to find the right solution to meet their specific needs,” said Andrew Fulton, senior director, global sales, CEM Systems. “We have maintained our position in the aviation market by continually developing AC2000 and by staying ahead of the industry. Malaysia Airlines key requirement was for one integrated security platform for access control, video and intrusion, as well as integration to an external visitor registration system.”

AC2000 met the requirements for high-level integration using the AC2000 DSC SIA Intruder Interface and the AC2000 American Dynamics TVR video interface. These modules allow the AC2000 access control system to act as the security management system (SMS), with DSC intrusion and American Dynamics range of digital video recorders visible from one unified platform. The AC2000 AED (Alarm Event Display) application forms a single user-friendly interface were administrators can centrally monitor access control, intruder and video systems, all in real time.

In addition, an AC2000 Application Programming Interface (API) has been provided to allow the seamless integration of an external visitor registration system to the AC2000 system visitor’s module. This allows Malaysian Airlines to transfer critical data from an existing visitor system for operational efficiency.

The system at Malaysia Airlines also features the latest in Web functionality with AC2000 WEB Visitors. The module provides a powerful Web-based tool which can be used to monitor visitor access from any location. AC2000 WEB Visitors provides users with the ability to add full details of a schedule visit including date, time, sponsor details and even a visitor image via a standard Web browser.

CEM has also provided Malaysia Airlines with a stable solution with a high level of redundancy. Server redundancy has been achieved using AC2000 Failover which provides a failsafe secondary server and the highest assurance of system reliability should communication be temporarily lost with the central AC2000 server.

For more information contact Tyco Security Products, +27 (0)82 566 5274, [email protected], www.tycosecurityproducts.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The future of security: intelligent automation
Access Control & Identity Management AI & Data Analytics IoT & Automation
As the security landscape evolves, businesses are no longer looking for stand-alone solutions, they want connected, intelligent systems that automate, streamline, and protect.

Read more...
Smart automation is changing security
SA Technologies IntelliGuard Access Control & Identity Management
Security has come a long way from manual check-ins, logbooks, and standalone surveillance cameras. With the rise of intelligent automation, security is now faster, smarter, and more connected than ever.

Read more...
The future of security in South Africa
ATG Digital Access Control & Identity Management
Security technology is evolving rapidly, but is local innovation keeping pace? Some global players recognise the potential of South African products for international markets, but can our manufacturers and service providers thrive without external support?

Read more...
Integration enhances estate access control
Access Control & Identity Management
With one-third of residential burglaries starting at the front door, the continued seamless integration of Glovent’s estate management platform with Impro access control software is welcome news for estates.

Read more...
T&A in South Africa’s retail sector
ERS Biometrics Access Control & Identity Management
Using existing systems, ERSBio provides a practical and more cost-effective way for businesses to manage operations, reduce payroll mistakes, and enhance overall efficiency through innovative T&A processes.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
Paxton opens second experience centre
Paxton News & Events Access Control & Identity Management
Security technology manufacturer, Paxton, has opened a new experience centre in Cape Town on 12 February in partnership with its exclusive distributors, Reditron and Regal Security.

Read more...
Vumacam highlights concerns with proposed Johannesburg CCTV by-laws
Vumacam News & Events Surveillance
Vumacam has raised objections to critical provisions of the by-laws governing privately owned CCTV cameras with a view of public spaces in the city, which were promulgated on Friday, 28 February 2025.

Read more...
DoorBell with built-in AI
Ajax Systems Access Control & Identity Management Products & Solutions Smart Home Automation
Ajax Systems has announced the release of Ajax DoorBell, which features built-in AI, an IR sensor, and app control, seamlessly integrating into the Ajax ecosystem to ensure efficiency and security confidence.

Read more...
Physical security evolving beyond security teams
ATG Digital Access Control & Identity Management
The landscape of physical security is undergoing a major shift. Traditionally, selecting access control and visitor management solutions fell squarely on the shoulders of security professionals, but today includes legal, IT, technical operations and more.

Read more...